Sciweavers

CCS
2015
ACM
8 years 3 months ago
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate ...
Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan
CCS
2015
ACM
8 years 3 months ago
AppPolicyModules: Mandatory Access Control for Third-Party Apps
Android has recently introduced the support for Mandatory Access Control, which extends previous security services relying on the Android Permission Framework and on the kernel-le...
Enrico Bacis, Simone Mutti, Stefano Paraboschi
CCS
2015
ACM
8 years 3 months ago
On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data
Privacy protection of time-series data, such as traces of household electricity usage reported by smart meters, is of much practical importance. Solutions are available to improve...
Chris Y. T. Ma, David K. Y. Yau
CCS
2015
ACM
8 years 3 months ago
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens
Two-factor authentication has been widely used due to the vulnerabilities associated with traditional text-based password. One-time password (OTP) plays an indispensable role on a...
He Sun, Kun Sun, Yuewu Wang, Jiwu Jing
CCS
2015
ACM
8 years 3 months ago
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android
In its latest comparison of Android Virus Detectors (AVDs), the independent lab AV-TEST reports that they have around 95% malware detection rate. This only indicates that current ...
Heqing Huang, Kai Chen 0012, Chuangang Ren, Peng L...
CCS
2015
ACM
8 years 3 months ago
Thwarting Fake OSN Accounts by Predicting their Victims
Traditional defense mechanisms for fighting against automated fake accounts in online social networks are victim-agnostic. Even though victims of fake accounts play an important ...
Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov,...
CCS
2015
ACM
8 years 3 months ago
Leakage-Abuse Attacks Against Searchable Encryption
Schemes for secure outsourcing of client data with search capability are being increasingly marketed and deployed. In the literature, schemes for accomplishing this efficiently a...
David Cash, Paul Grubbs, Jason Perry, Thomas Riste...
CCS
2015
ACM
8 years 3 months ago
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads
Vulnerabilities that disclose executable memory pages enable a new class of powerful code reuse attacks that build the attack payload at runtime. In this work, we present Heisenby...
Adrian Tang, Simha Sethumadhavan, Salvatore J. Sto...
CCS
2015
ACM
8 years 3 months ago
Armadillo: A Compilation Chain for Privacy Preserving Applications
In this work we present Armadillo a compilation chain used for compiling applications written in a high-level language (C++) to work on encrypted data. The back-end of the compila...
Sergiu Carpov, Paul Dubrulle, Renaud Sirdey
CCS
2015
ACM
8 years 3 months ago
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity
Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, How...